SlideShare a Scribd company logo
1 of 17
Download to read offline
Charles Mok | Cyber Policy Center, Stanford University | April 3, 2023 | Rikkyo University, Japan
Digital Authoritarianism,
Asian Techno-Geopolitics and
Technology Fragmentation
Chinese Digital Authoritarianism
Repressive Practices
• Through technology, operation and laws
• Beyond “GFW” (Great FireWall of China)
• From Censorship (passive) to Total Control (active)
• Fear; Friction; Flooding
• Misinformation strategy
• Starting with total control on infrastructure and backbone
Smart City to Massive Surveillance
• Informatization of city management — transportation, public safety,
healthcare, environmental protection….
• Utilizing technologies: IoT, 5G, AI, Big Data, Cloud computing….
• China’s SkyNet project: surveillance camera network with facial recognition
and AI
• BBC reporter John Sudworth (Guiyang, Guizhou Provincel 2017): “caught in 7
minutes”
• Massive deployment in Xinjiang and everywhere
Social Credit
• State Council document: “Guidelines of Social Credit System Construction (2014-2020)”:
• The system aims at standardizing assessment for businesses, organizations and individuals,
measuring
fi
nancial, social and political worthiness
• Rather than a single score to limit social activities of movements of individuals, it still focuses
more on business or marketplace behaviors
• The system is still fragmente now, not fully digitized and decisions are largely made by
humans rather than AI
• However, the system is still a
fl
exible tool for rapid and strict enforcement when “necessary”
• Do not under-estimate the acceptance by the average Chinese public — social harmony,
crime prevention, in a “low trust society”
Rule by Law
Under the CAC
• Cybersecurity Law (CSL) of 2017, amended/clari
fi
ed in 2021
• Amalgamation of previous Internet censorship laws and unifying control
• Data sovereignty requirements, and state security agencies can seize data
• Critical information infrastructure” subject to national security review over data security, procurement and cross-
border data
fl
ow, etc.
• Should not “invite subversion of national sovereignty, overturn the socialist system, incite separatism, break
national unity, advocate terrorism or extremism. advocate ethnic hatred and discrimination, disseminate violent,
obscene or sexual information, create or disseminate false information to disrupt economic or social order.”
• Other recent major laws: Data Security Law (DSL), Personal Information Protection Law (PIPL).
• Long-arm jurisdiction
• Tech crackdown
Exporting Repression
Digital Silk Road
• “Masterplan by Beijing to deploy its “techno-authoritarian model” to Belt and Road
countries (since 2015)
• Dual-use technologies: military and industrial/civilian usages
• Next-generation national
fi
rewall — active surveillance and data analytics
• Thailand (failed attempt in 2015); Cambodia ongoing e
ff
ort (since 2020)
• State
fi
nancing for many African and Asian nations to pay for equipments and projects
from Huawei, ZTE, etc.
• WSJ (2019): Uganda and Zambia’s governments intercepted encrypted communications
and social media messages and used cell locations to track political opponents.
China’s Global Data Grab
• 5G and infrastructure providers: Huawei, ZTE, etc.
• US-led sanctions
• Surveillance cameras and facial recognition: Hikvison etc.
• Strong pushbacks from western countries (UK, Australia, etc.)
• Consumer products and services
• Mobile phones by Huawei, Xiaomi, etc.
• AliPay, WeChatPay
• Didi Chuxing
• TikTok
• WeChat
Technology Standards
The tech and the process
• Targeted e
ff
orts to achieve growing global in
fl
uence
• Unlimited cooperation between China and Russia
• Huawei as proxy agent to advance China’s proposed standards, such as
“New IP” or “IPv6+”, promoting the idea of strong regulatory binding between
IP address and a user
• Attempts to change the global technical standards decision process:
• From multistakeholderism of IETF, IEEE, IAB, IRTF, W3C to state-led ITU
• 2022 Election of ITU’s Secretary General: USA vs Russia
But it’s not just China…
All over Asia
• Misinformation and election interference
• Illegal content especially CSAM (child sexual abuse materials)
• Cybersecurity and ransomware
• Every government wants to be able to remove content they don’t like
• India: IT Regulations
• Singapore: Protection from Online Falsehoods and Manipulation Act (POFMA) and foreign interference law
• Cambodia: National Internet Gateway, etc.
• Philippines: SIM card registration law
• Vietnam, Myanmar, etc.: Cybersecurity law
What about Hong Kong?
• NSL (2020)
• Personal Data (Privacy) Law amendments — anti-doxxing
• SIM card registration (from March 2023)
• Crowdfunding regulations consultation
• Misinformation law
• Cybersecurity law
• Article 23 legislation and NSL
Western democracies want more control too
• Problematic legislations in the west:
• UK’s Online Safety Bill, US’s EARN-IT Act, etc.
• Also Australia, Canada, EU, etc.
• Threats against end-to-end encryption
• Fixation on war on Big Tech: misguided?
• Losing the moral high ground over autocratic governments
Undersea cables meet geopolitics
Focus on South China Sea
The Internet will be fragmented
One world, one Internet no more
• Cyber sovereignty — beginning with data fragmentation
• Data residency laws everywhere
• Infrastructure fragmentation — from undersea cables to space satellites
• Semiconductor supply chain fragmentation
• App/web fragmentation — from GFW to TikTok — both sides now
• AI fragmentation
• Tech standards fragmentation
• Regulatory fragmentation
• Misinformation law, cybersecurity law, real-name registration law (e.g. SIM card rules) — call them by any names
• Both autocracies and democracies
Values fragmentation
Declaration for the Future of the Internet ~ US Summit for Democracy
Values fragmentation
World Internet Conference — China and friends
• Extension of the Digital Silk
Road
• “Internationalization” of
Internet and “cyberspace”
governance
Where do we go from here?
• Internet freedom cannot be taken for granted anywhere anymore
• It’s complicated — no simple solution
• Two battlegrounds, two strategies?
• Autocracies
• Democracies
• How can we strengthen multi-stakeholder participation?
• Empowering civil society and civil defenders
Charles Mok
Visiting Scholar, Global Digital Policy
Incubator, Cyber Policy Center, Stanford
University
Trustee, Internet Society
Director, Tech for Good Asia

More Related Content

Similar to Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation

全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇Charles Mok
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsCharles Mok
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet Charles Mok
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong KongCharles Mok
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyProf. Neeta Awasthy
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MITChris Marsden
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of GovernmentsRobbie Mitchell
 
Technica Distributed Ledger Primer
Technica Distributed Ledger PrimerTechnica Distributed Ledger Primer
Technica Distributed Ledger PrimerBill Groah
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsGerry Elman
 
Net Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open InternetNet Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open InternetCybera Inc.
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
GTP Presentation: Development Drivers in the Network Society
GTP Presentation: Development Drivers in the Network SocietyGTP Presentation: Development Drivers in the Network Society
GTP Presentation: Development Drivers in the Network SocietyGreater_Tygerberg_Partnership
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 

Similar to Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation (20)

全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two Systems
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta Awasthy
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MIT
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
 
Alan Shark
Alan SharkAlan Shark
Alan Shark
 
Technica Distributed Ledger Primer
Technica Distributed Ledger PrimerTechnica Distributed Ledger Primer
Technica Distributed Ledger Primer
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
 
Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Understanding big data using IoT
 
Net Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open InternetNet Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open Internet
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
GTP Presentation: Development Drivers in the Network Society
GTP Presentation: Development Drivers in the Network SocietyGTP Presentation: Development Drivers in the Network Society
GTP Presentation: Development Drivers in the Network Society
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 

More from Charles Mok

ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionCharles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfCharles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyCharles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsCharles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and EthicsCharles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdfCharles Mok
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCharles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldCharles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsCharles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and IdentityCharles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckCharles Mok
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsCharles Mok
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T Charles Mok
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點Charles Mok
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由Charles Mok
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Charles Mok
 
香港科技罪行法例改革:何去何從?
香港科技罪行法例改革:何去何從?香港科技罪行法例改革:何去何從?
香港科技罪行法例改革:何去何從?Charles Mok
 
Driving Hong Kong Forward in the Age of 5G and Innovation
Driving Hong Kong Forward in the Age of 5G and InnovationDriving Hong Kong Forward in the Age of 5G and Innovation
Driving Hong Kong Forward in the Age of 5G and InnovationCharles Mok
 

More from Charles Mok (20)

ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
 
香港科技罪行法例改革:何去何從?
香港科技罪行法例改革:何去何從?香港科技罪行法例改革:何去何從?
香港科技罪行法例改革:何去何從?
 
Driving Hong Kong Forward in the Age of 5G and Innovation
Driving Hong Kong Forward in the Age of 5G and InnovationDriving Hong Kong Forward in the Age of 5G and Innovation
Driving Hong Kong Forward in the Age of 5G and Innovation
 

Recently uploaded

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation

  • 1. Charles Mok | Cyber Policy Center, Stanford University | April 3, 2023 | Rikkyo University, Japan Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
  • 2. Chinese Digital Authoritarianism Repressive Practices • Through technology, operation and laws • Beyond “GFW” (Great FireWall of China) • From Censorship (passive) to Total Control (active) • Fear; Friction; Flooding • Misinformation strategy • Starting with total control on infrastructure and backbone
  • 3. Smart City to Massive Surveillance • Informatization of city management — transportation, public safety, healthcare, environmental protection…. • Utilizing technologies: IoT, 5G, AI, Big Data, Cloud computing…. • China’s SkyNet project: surveillance camera network with facial recognition and AI • BBC reporter John Sudworth (Guiyang, Guizhou Provincel 2017): “caught in 7 minutes” • Massive deployment in Xinjiang and everywhere
  • 4. Social Credit • State Council document: “Guidelines of Social Credit System Construction (2014-2020)”: • The system aims at standardizing assessment for businesses, organizations and individuals, measuring fi nancial, social and political worthiness • Rather than a single score to limit social activities of movements of individuals, it still focuses more on business or marketplace behaviors • The system is still fragmente now, not fully digitized and decisions are largely made by humans rather than AI • However, the system is still a fl exible tool for rapid and strict enforcement when “necessary” • Do not under-estimate the acceptance by the average Chinese public — social harmony, crime prevention, in a “low trust society”
  • 5. Rule by Law Under the CAC • Cybersecurity Law (CSL) of 2017, amended/clari fi ed in 2021 • Amalgamation of previous Internet censorship laws and unifying control • Data sovereignty requirements, and state security agencies can seize data • Critical information infrastructure” subject to national security review over data security, procurement and cross- border data fl ow, etc. • Should not “invite subversion of national sovereignty, overturn the socialist system, incite separatism, break national unity, advocate terrorism or extremism. advocate ethnic hatred and discrimination, disseminate violent, obscene or sexual information, create or disseminate false information to disrupt economic or social order.” • Other recent major laws: Data Security Law (DSL), Personal Information Protection Law (PIPL). • Long-arm jurisdiction • Tech crackdown
  • 6. Exporting Repression Digital Silk Road • “Masterplan by Beijing to deploy its “techno-authoritarian model” to Belt and Road countries (since 2015) • Dual-use technologies: military and industrial/civilian usages • Next-generation national fi rewall — active surveillance and data analytics • Thailand (failed attempt in 2015); Cambodia ongoing e ff ort (since 2020) • State fi nancing for many African and Asian nations to pay for equipments and projects from Huawei, ZTE, etc. • WSJ (2019): Uganda and Zambia’s governments intercepted encrypted communications and social media messages and used cell locations to track political opponents.
  • 7. China’s Global Data Grab • 5G and infrastructure providers: Huawei, ZTE, etc. • US-led sanctions • Surveillance cameras and facial recognition: Hikvison etc. • Strong pushbacks from western countries (UK, Australia, etc.) • Consumer products and services • Mobile phones by Huawei, Xiaomi, etc. • AliPay, WeChatPay • Didi Chuxing • TikTok • WeChat
  • 8. Technology Standards The tech and the process • Targeted e ff orts to achieve growing global in fl uence • Unlimited cooperation between China and Russia • Huawei as proxy agent to advance China’s proposed standards, such as “New IP” or “IPv6+”, promoting the idea of strong regulatory binding between IP address and a user • Attempts to change the global technical standards decision process: • From multistakeholderism of IETF, IEEE, IAB, IRTF, W3C to state-led ITU • 2022 Election of ITU’s Secretary General: USA vs Russia
  • 9. But it’s not just China… All over Asia • Misinformation and election interference • Illegal content especially CSAM (child sexual abuse materials) • Cybersecurity and ransomware • Every government wants to be able to remove content they don’t like • India: IT Regulations • Singapore: Protection from Online Falsehoods and Manipulation Act (POFMA) and foreign interference law • Cambodia: National Internet Gateway, etc. • Philippines: SIM card registration law • Vietnam, Myanmar, etc.: Cybersecurity law
  • 10. What about Hong Kong? • NSL (2020) • Personal Data (Privacy) Law amendments — anti-doxxing • SIM card registration (from March 2023) • Crowdfunding regulations consultation • Misinformation law • Cybersecurity law • Article 23 legislation and NSL
  • 11. Western democracies want more control too • Problematic legislations in the west: • UK’s Online Safety Bill, US’s EARN-IT Act, etc. • Also Australia, Canada, EU, etc. • Threats against end-to-end encryption • Fixation on war on Big Tech: misguided? • Losing the moral high ground over autocratic governments
  • 12. Undersea cables meet geopolitics Focus on South China Sea
  • 13. The Internet will be fragmented One world, one Internet no more • Cyber sovereignty — beginning with data fragmentation • Data residency laws everywhere • Infrastructure fragmentation — from undersea cables to space satellites • Semiconductor supply chain fragmentation • App/web fragmentation — from GFW to TikTok — both sides now • AI fragmentation • Tech standards fragmentation • Regulatory fragmentation • Misinformation law, cybersecurity law, real-name registration law (e.g. SIM card rules) — call them by any names • Both autocracies and democracies
  • 14. Values fragmentation Declaration for the Future of the Internet ~ US Summit for Democracy
  • 15. Values fragmentation World Internet Conference — China and friends • Extension of the Digital Silk Road • “Internationalization” of Internet and “cyberspace” governance
  • 16. Where do we go from here? • Internet freedom cannot be taken for granted anywhere anymore • It’s complicated — no simple solution • Two battlegrounds, two strategies? • Autocracies • Democracies • How can we strengthen multi-stakeholder participation? • Empowering civil society and civil defenders
  • 17. Charles Mok Visiting Scholar, Global Digital Policy Incubator, Cyber Policy Center, Stanford University Trustee, Internet Society Director, Tech for Good Asia